Change logs for libiberty source package in Xenial

  • libiberty (20160215-1ubuntu0.3) xenial-security; urgency=medium
    
      * SECURITY UPDATE: stack Exhaustion in C++ demangling
        - debian/patches/CVE-2018-9138.patch: limit recusion and add
          --no-recruse-limit option to tools that support name demangling.
        - debian/patches/CVE-2018-9138-2.patch: fix a failure in the libiberty
          testsuite by increasing the recursion limit to 2048.
        - CVE-2018-9138
        - CVE-2018-12641
        - CVE-2018-12697
        - CVE-2018-12698
        - CVE-2018-17794
        - CVE-2018-17985
        - CVE-2018-18484
        - CVE-2018-18700
        - CVE-2018-18701
      * SECURITY UPDATE: excessive memory consumption
        - debian/patches/CVE-2018-12934.patch: remove support for demangling
          GCC 2.x era mangling schemes.
        - CVE-2018-12934
        - CVE-2018-18483
      * SECURITY UPDATE: stack consumption and heap-based buffer over-read
        - debian/patches/CVE-2019-907x.patch: reject negative lengths and add
          recursion counter.
        - CVE-2019-9070
        - CVE-2019-9071
      * SECURITY UPDATE: integer overflow and heap-based buffer overflow
        - debian/patches/CVE-2019-14250.patch: check zero value shstrndx.
        - CVE-2019-14250
    
     -- Marc Deslauriers <email address hidden>  Wed, 01 Apr 2020 11:39:51 -0400
  • libiberty (20160215-1ubuntu0.2) xenial-security; urgency=medium
    
      * SECURITY UPDATE: integer overflow in string_appends
        - debian/patches/CVE-2016-2226.patch: check for overflow in
          libiberty/cplus-dem.c.
        - CVE-2016-2226
      * SECURITY UPDATE: use-after-free vulberabilities
        - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
          libiberty/cplus-dem.c, added test to
          libiberty/testsuite/demangle-expected.
        - CVE-2016-4487
        - CVE-2016-4488
      * SECURITY UPDATE: integer overflow in gnu_special
        - debian/patches/CVE-2016-4489.patch: handle case where consume_count
          returns -1 in libiberty/cplus-dem.c.
        - CVE-2016-4489
      * SECURITY UPDATE: integer overflow after sanity checks
        - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
          of long in libiberty/cp-demangle.c, added test to
          libiberty/testsuite/demangle-expected.
        - CVE-2016-4490
      * SECURITY UPDATE: denial of service via infinite recursion
        - debian/patches/CVE-2016-4491-1.patch: limit recursion in
          include/demangle.h, libiberty/cp-demangle.c, libiberty/cp-demint.c,
          added test to libiberty/testsuite/demangle-expected.
        - debian/patches/CVE-2016-4491-2.patch: limit more recursion in
          libiberty/cp-demangle.c.
        - debian/patches/CVE-2016-4491-3.patch: initialize d_printing in
          libiberty/cp-demangle.c.
        - CVE-2016-4491
      * SECURITY UPDATE: buffer overflow in do_type
        - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
          and overflow in libiberty/cplus-dem.c, added test to
          libiberty/testsuite/demangle-expected.
        - CVE-2016-4492
        - CVE-2016-4493
      * SECURITY UPDATE: denial of service via infinite recursion
        - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
          libiberty/cplus-dem.c, added test to
          libiberty/testsuite/demangle-expected.
        - CVE-2016-6131
    
     -- Marc Deslauriers <email address hidden>  Mon, 12 Jun 2017 12:43:14 -0400
  • libiberty (20160215-1) unstable; urgency=medium
    
      * Update to 20160215.
    
     -- Matthias Klose <email address hidden>  Mon, 15 Feb 2016 20:15:28 +0100
  • libiberty (20141014-1) unstable; urgency=medium
    
    
      * Update to 20141014.
    
     -- Matthias Klose <email address hidden>  Tue, 14 Oct 2014 14:23:53 +0200